Popular Articles
Today Week Month Year


Hackers can use this Bluetooth exploit to TRACK and IDENTIFY iOS and Microsoft smartphone users, warn security researchers
By Arsenio Toledo // May 12, 2020

Researchers say they have found a flaw in Bluetooth communication that leaves many iOS and Microsoft devices open to being tracked. The researchers also warn that the flaw can leak a user's ID.

Brighteon.TV

Devices that are susceptible to hacking include iOS devices such as iPads and Apple watches, Microsoft products like surface tablets and laptops and FitBits.

“Basically everybody is carrying around a Bluetooth device nowadays in some way, shape or form and that makes it very relevant,” said Johannes Becker, graduate researcher from Boston University.

Devices send out custom addresses that make them susceptible to tracking

When two Bluetooth devices pair up with each other, one device acts as the primary connection, while the other end plays a tertiary role. This tertiary device, such as a speaker or wireless earphones, send out a signal similar to an IP address that contains personal data about the connection.

Technically, this connection is supposed to be an address that can reconfigure itself to protect the identity of the users. However, if hackers were to use a “sniffer program,” a piece of public software that can scan for Bluetooth connections in a nearby area, it could find and identify devices even after the addresses have been reconfigured. (Related: STUPID TECH on parade as company releases Bluetooth-connected salt shaker controlled by Amazon Alexa... is this really necessary?)

The sniffer program uses an algorithm that the researchers have developed known as an address-carryover algorithm. This can exploit “the asynchronous nature of payload and address changes to achieve tracking beyond the address randomization of a device,” wrote the researchers in their paper.

“The algorithm does not require message decryption or breaking Bluetooth security in any way, as it is based entirely on public, unencrypted advertising traffic.”

The unencrypted data comes from “advertising events” that devices send out. These events contain custom data structures that help Windows, iOS and macOS devices interact with other devices within their Bluetooth range. The events can also be used to uniquely identify devices.

The combination of unencrypted data being transmitted regularly and containing personal information means that hackers won't even need to use illegal software to obtain a person's information.

Smart devices are even more vulnerable to tracking

Becker and his research partners David Starobinski and David Li found that Android devices aren't susceptible to this vulnerability because they have a different way of communicating with their tertiary Bluetooth partners. Android devices scan for custom addresses that they can connect to instead of constantly advertising themselves like the way iOS, Microsoft and other smart devices do.

Li, in a statement, remarked that they were surprised at how vulnerable FitBit devices were. He said that restarting the device or draining its battery didn't change the FitBit's custom address, which they say was completely unexpected.

People with devices that may be vulnerable, for comparison, could simply turn their Bluetooth off when they aren't using it, and turn it back on when necessary. This gives the device a new, randomized address. Unfortunately, this doesn't apply to smart devices like FitBit and SmartPen, which neither update nor hide their custom addresses.

The researchers fear that hackers who can figure out how to access the permanent addresses on FitBits, SmartPens and other smart devices could use their knowledge to stalk, spy and abuse innocent people.

For more articles about products that can potentially invade people's privacy, check out the articles at PrivacyWatch.news.

Sources include:

DailyMail.co.uk

ZDNet.com

PETSymposium.org [PDF]

iMore.com



Take Action:
Support NewsTarget by linking to this article from your website.
Permalink to this article:
Copy
Embed article link:
Copy
Reprinting this article:
Non-commercial use is permitted with credit to NewsTarget.com (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.

NewsTarget.com © 2022 All Rights Reserved. All content posted on this site is commentary or opinion and is protected under Free Speech. NewsTarget.com is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. NewsTarget.com assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published on this site. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
News Target uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Close
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.